Name | fowl JSON |
Version |
24.12.0
JSON |
| download |
home_page | None |
Summary | Forward Over Wormhole Locally provides bi-directional streaming data over secure and durable Dilated magic-wormhole connections. Secure communication with easy setup. |
upload_time | 2024-12-17 19:49:00 |
maintainer | None |
docs_url | None |
author | None |
requires_python | >=3.6 |
license | The MIT License (MIT) Copyright (c) 2023 meejah Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
keywords |
cryptography
forwarding
magic-wormhole
private
|
VCS |
|
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
Forward over Wormhole, Locally (fowl)
=====================================
.. image:: _static/logo.svg
:width: 42%
:align: right
:alt: Fowl Logo: a chicken head with two blue ethernet cables
Get TCP streams from one computer to another, safely.
(The base protocol below `Magic Wormhole <https://github.com/magic-wormhole/magic-wormhole>`_ provides a powerful account-less, peer-to-peer networking solution -- ``fowl`` helps you use this power immediately with existing programs)
🤔 Motivation
-------------
We sometimes pair-program but don't like the idea of sending keystrokes over a third-party server.
We also like avoiding the extra work of "set up a server on a public IP address".
For more context, see my blog posts: `Forwarding Streams over Magic Wormhole <https://meejah.ca/blog/fow-wormhole-forward>`_ and `Wizard Gardens vision <https://meejah.ca/blog/wizard-gardens-vision>`_.
To generalize this a little: there are many FOSS client/server programs that _can_ be self-hosted -- ``fowl`` lets us use these sorts of programs in a peer-to-peer fashion, behind NATs.
This means only depending on one general-purpose, public-IP-having server (the Magic Wormhole "mailbox server" used to set up connections) instead of "one per application" (or more).
🦃 What?
--------
The command-line tool ``fowl`` allows you use any client/server program over `Magic Wormhole <https://github.com/magic-wormhole/magic-wormhole>`_.
Magic Wormhole provides a *persistent*, strongly-encrypted session (end-to-end) with no need for pre-shared keys.
Conceptually, this is somewhat similar to combining ``ssh -R`` and ``ssh -L``.
``fowl`` may be used to set up complex workflows directly between participants, integrating services that would "traditionally" demand a server on a public IP address.
Key features:
* no need to pre-exchange keys
* simple, one-time-use codes that are easy to transcribe
* secure (full-strength keys via SPAKE2)
* end-to-end encryption (and no possibility for unencrypted application data)
* integrate with any tools that can listen on or connect to localhost
This allows an author to write a "glue" program in *any language* that ties together unchanged networked progams.
The communcation channel is:
* set up *without pre-shared secrets*;
* *fully encrypted*;
* and *survives IP address changes or outages*.
All this with *no action required at the application level*, it is just a normal localhost TCP (or UNIX) streaming socket.
✍ Motivational Example
----------------------
When pair-programming using `tty-share <https://tty-share.com/>`_ one handy option is to use the default, public server.
However, *I don't like the idea of sending keystrokes over a third-party server* that I don't run.
(Please note: I have **no** reason to believe this nice person is doing anything nefarious!)
I could fire up such a server myself and use it with my friends...
...but with ``fowl``, one side can run a localhost ``tty-share`` server and the other side can run a ``tty-share`` client that connects to a ``localhost`` endpoint -- data flows over the wormhole connection (only).
**Key advantage**: *no need to expose keystrokes to a third-party server*.
**Additional advantage**: *no need to set up a server on a public IP address*.
🐃 Why is This Particular Yak Being Shorn?
------------------------------------------
I wanted to write a pair-programming application in Haskell, but didn't want to implement Dilation in the Magic Wormhole Haskell library (maybe one day!)
It also occurred to me that other people might like to experiment with Magic Wormhole (and advanced features like Dilation) in languages that lack a Magic Wormhole implementation -- that is, most of them!
So, the first step in "write a Haskell pair-programming utility" became "write and release a Python program" :)
(p.s. the next-higher level Yak is now online at `sr.ht <https://git.sr.ht/~meejah/pear-on>`_ but not "released")
⌨ How Does It Work?
-------------------
``fowl`` uses the "`Dilation <https://magic-wormhole.readthedocs.io/en/latest/api.html#dilation>`_" feature of the `Magic Wormhole <https://github.com/magic-wormhole/magic-wormhole>`_ protocol.
This means that a Magic Wormhole Mailbox server is used to perform a SPAKE2 exchange via a short (but one-time only) pairing code.
For details on the security arguments, please refer to `the Magic Wormhole documentation <https://magic-wormhole.readthedocs.io/>`_.
After this, an E2E-encrypted direct P2P connection (or, in some cases, via a "transit relay" service) is established between the two computers;
that is, between the computer that created the wormhole code, and the one that consumed it.
The key encrypting messages on this connection is only known to the two computers; the Mailbox server cannot see any message contents.
(It, like any attacker, could try a single guess at the wormhole code). See the `Magic Wormhole documentation <https://magic-wormhole.readthedocs.io/en/latest/welcome.html#design>`_ for more details on this.
The "Dilation" feature further extends the above protocol to provide subchannels and "durability" -- this means the overall connection survives network changes, disconnections, etc.
You can change WiFi networks or put one computer to sleep yet remain connected.
What ``fowl`` adds is a way to set up any number of localhost listeners on either end, forwarding data over subchannels.
The always-present "control" subchannel is used to co-ordinate opening and closing such listeners.
With some higher-level co-ordination, ``fowl`` may be used to set up complex workflows between participants, integrating services that would "traditionally" demand a server on a public IP address.
Another way to view this: streaming network services can integrate the Magic Wormhole protocol without having to find, link, and use a magic-wormhole library (along with the implied code-changes) -- all integration is via local streams.
(There *are* implementations in a few languages so you could take that route if you prefer).
👤 Who Should Use This?
-----------------------
We handle and expect two main use-cases of this program: integrators and end-users.
Human CLI users can use ``fowl`` itself to set up and use connections, for any purpose.
For developers doing integration, ``fowld`` provides a simple stdin/out protocol for any runtime to use.
That is, some "glue" code running ``fowld`` as a sub-process.
This co-ordinatoin program will also handle running necessary client-type or server-type networking applications that accomplish some goal useful to users. For example, "pair-programming" (for my case).
Some other ideas to get you started:
- "private" / invite-only streaming (one side runs video source, invited sides see it)
- on-demand tech support or server access (e.g. set up limited-time SSH, VNC, etc)
- ...
💼 Installation and Basic Usage
-------------------------------
``fowl`` and ``fowld`` are Python programs using the `Twisted <https://twisted.org>`_ asynchronous networking library.
You may install them with ``pip``::
pip install fowl
Once this is done, ``fowl`` and ``fowld`` will appear on your ``PATH``.
Run either for instructions on use.
In accordance with best practices, we recommend using a ``virtualenv`` to install all Python programs.
**Never use ``sudo pip``**.
To create a virtualenv in your checkout of ``fowl``, for example:
.. code-block:: shell
python -m venv venv
./venv/bin/pip install --upgrade pip
./venv/bin/pip install fowl
# or: ./venv/bin/pip install --editable .
./venv/bin/fowl
.. _hello-world-chat:
💬 Hello World: Chat!
---------------------
The actual "hello world" of networked applications these days is chat, amirite? 😉
We will use two venerable network utilities (``nc`` and ``telnet``) to implement a **simple, secure, and e2e-encrypted chat**.
Yes, that's correct: we will make secure chat over ``telnet``.
The first insight here is that we can make ``nc`` listen on a localhost-only port, and we can make ``telnet`` connect to a localhost TCP port.
At first we can prove the concept locally, from one terminal to another.
Open two terminals.
In the first, run: ``nc -l localhost 8888``
This tells ``nc`` (aka "net cat") to listen on the localhost TCP port "8888" (it will echo anything that comes in, and send anything you type).
In the second terminal: ``telnet localhost 8888``
This instructs telnet to connect to localhost TCP port 8888 -- that is, the very netcat instance running in the first terminal.
Type "hello world" into either of the terminals, and you should see it appear on the other side.
**Goal achieved!**, partially.
We have "chat" over ``nc`` and ``telnet``.
It's not pretty, but it works fine.
However, we want to talk to other machines.
This means we need:
* encryption;
* and a way to arrange network connectivity
**These additional features are exactly what ``fowl`` gives us.**
So, we still run the exact same ``nc`` and ``telnet`` commands, but first do some ``fowl`` magic on each machine.
On the *second* machine (the one running ``telnet``) we'll need to add in something that listens on port 8888.
This thing is: ``fowl --listen 8888 invite``
When connected to the public Mailbox Server, this will print out a ``<secret code>`` like ``1-foo-bar``
Next we want all the information this listener gets to be magically forwarded to the first machine (the one running ``nc``).
So, on it we run: ``fowl --allow-connect 8888 accept <secret code>``.
The ``<secret code>`` comes from the "invite" above, and is communicated -- usually via a human or two -- to the second machine.
Note that we could swap "``invite``" and "``accept``" around if it's more convenient for one or the other human to go first.
What happens under the hood is that the two ``fowl`` programs establish a secure connection, via the public Mailbox Server.
They then use this connection to maintain a persistent (possibly changing) TCP connection between each other (worst case, using the public Transit Relay) to send end-to-end encrypted messages.
``fowl`` uses this connection to communicate via a simple protocol that can establish listeners on either end or ask for fresh connections.
These result in "subchannels" (in the Magic Wormhole Dilation protocol) that can send bytes back or forth.
Any bytes received at either end of the connection are simply forwarded over the subchannel.
Full example, computer one:
.. code-block:: shell
$ nc -l localhost 8888
$ fowl --allow-connect 8888 invite
Invite code: 1-foo-bar
Computer two:
.. code-block:: shell
$ fowl --listen 8888 accept 1-foo-bar
$ telnet localhost 8888
**Now we have encrypted chat**.
These two programs can run **anywhere on the Internet**.
Like TCP promises, all bytes are delivered in-order.
In addition, they are **encrypted**.
Also the stream will **survive changing networks** (disconnects, new IP addresses, etc); that is, the actual inter-computer TCP connection is re-stablished, but to the applications (``nc``, ``telnet``) it looks uninterupted.
.. note::
The two public servers mentioned (the Mailbox Server and the Transit Relay) will learn the IP addresses of who is communicating.
Tor is supported for users who do not wish to reveal their network location.
**Neither server can see any plaintext** (like any other attacker, the Mailbox Server could try a single but destructive and noticable guess at the code for any mailbox).
📦 Other Platforms
------------------
We welcome contributions from people experienced with packaging for other installation methods; please get in touch!
🚚 Stability and Releases
-------------------------
This is an early release of, essentially, a proof-of-concept.
While we intend to make it a stable base to put co-ordination software on top, it is not yet there.
APIs may change, options may change.
If you are developing on top of ``fowl``, please get in touch so we know what you need 😊
All releases are on PyPI with versioning following a `CalVer <https://calver.org>`_ variant: ``year.month.number``, like ``23.4.0`` (for the first release in April, 2023).
See ``NEWS.rst`` for specific release information.
🧙 Contributors
---------------
- `meejah <https://meejah.ca>`_: main development
- `balejk <https://github.com/balejk>`_: early feedback, proof-reading, review and testing
Raw data
{
"_id": null,
"home_page": null,
"name": "fowl",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": null,
"keywords": "cryptography, forwarding, magic-wormhole, private",
"author": null,
"author_email": "meejah <meejah@meejah.ca>",
"download_url": "https://files.pythonhosted.org/packages/98/dc/c92f7184cc7b687825526ca755aecd0191556775401659a81e134c77862d/fowl-24.12.0.tar.gz",
"platform": null,
"description": "Forward over Wormhole, Locally (fowl)\n=====================================\n\n.. image:: _static/logo.svg\n :width: 42%\n :align: right\n :alt: Fowl Logo: a chicken head with two blue ethernet cables\n\nGet TCP streams from one computer to another, safely.\n\n(The base protocol below `Magic Wormhole <https://github.com/magic-wormhole/magic-wormhole>`_ provides a powerful account-less, peer-to-peer networking solution -- ``fowl`` helps you use this power immediately with existing programs)\n\n\n\ud83e\udd14 Motivation\n-------------\n\nWe sometimes pair-program but don't like the idea of sending keystrokes over a third-party server.\nWe also like avoiding the extra work of \"set up a server on a public IP address\".\n\nFor more context, see my blog posts: `Forwarding Streams over Magic Wormhole <https://meejah.ca/blog/fow-wormhole-forward>`_ and `Wizard Gardens vision <https://meejah.ca/blog/wizard-gardens-vision>`_.\n\nTo generalize this a little: there are many FOSS client/server programs that _can_ be self-hosted -- ``fowl`` lets us use these sorts of programs in a peer-to-peer fashion, behind NATs.\nThis means only depending on one general-purpose, public-IP-having server (the Magic Wormhole \"mailbox server\" used to set up connections) instead of \"one per application\" (or more).\n\n\n\ud83e\udd83 What?\n--------\n\nThe command-line tool ``fowl`` allows you use any client/server program over `Magic Wormhole <https://github.com/magic-wormhole/magic-wormhole>`_.\nMagic Wormhole provides a *persistent*, strongly-encrypted session (end-to-end) with no need for pre-shared keys.\n\nConceptually, this is somewhat similar to combining ``ssh -R`` and ``ssh -L``.\n``fowl`` may be used to set up complex workflows directly between participants, integrating services that would \"traditionally\" demand a server on a public IP address.\n\nKey features:\n\n* no need to pre-exchange keys\n* simple, one-time-use codes that are easy to transcribe\n* secure (full-strength keys via SPAKE2)\n* end-to-end encryption (and no possibility for unencrypted application data)\n* integrate with any tools that can listen on or connect to localhost\n\nThis allows an author to write a \"glue\" program in *any language* that ties together unchanged networked progams.\nThe communcation channel is:\n\n* set up *without pre-shared secrets*;\n* *fully encrypted*;\n* and *survives IP address changes or outages*.\n\nAll this with *no action required at the application level*, it is just a normal localhost TCP (or UNIX) streaming socket.\n\n\n\u270d Motivational Example\n----------------------\n\nWhen pair-programming using `tty-share <https://tty-share.com/>`_ one handy option is to use the default, public server.\nHowever, *I don't like the idea of sending keystrokes over a third-party server* that I don't run.\n(Please note: I have **no** reason to believe this nice person is doing anything nefarious!)\n\nI could fire up such a server myself and use it with my friends...\n\n...but with ``fowl``, one side can run a localhost ``tty-share`` server and the other side can run a ``tty-share`` client that connects to a ``localhost`` endpoint -- data flows over the wormhole connection (only).\n\n**Key advantage**: *no need to expose keystrokes to a third-party server*.\n\n**Additional advantage**: *no need to set up a server on a public IP address*.\n\n\n\ud83d\udc03 Why is This Particular Yak Being Shorn?\n------------------------------------------\n\nI wanted to write a pair-programming application in Haskell, but didn't want to implement Dilation in the Magic Wormhole Haskell library (maybe one day!)\n\nIt also occurred to me that other people might like to experiment with Magic Wormhole (and advanced features like Dilation) in languages that lack a Magic Wormhole implementation -- that is, most of them!\n\nSo, the first step in \"write a Haskell pair-programming utility\" became \"write and release a Python program\" :)\n\n(p.s. the next-higher level Yak is now online at `sr.ht <https://git.sr.ht/~meejah/pear-on>`_ but not \"released\")\n\n\n\u2328 How Does It Work?\n-------------------\n\n``fowl`` uses the \"`Dilation <https://magic-wormhole.readthedocs.io/en/latest/api.html#dilation>`_\" feature of the `Magic Wormhole <https://github.com/magic-wormhole/magic-wormhole>`_ protocol.\n\nThis means that a Magic Wormhole Mailbox server is used to perform a SPAKE2 exchange via a short (but one-time only) pairing code.\nFor details on the security arguments, please refer to `the Magic Wormhole documentation <https://magic-wormhole.readthedocs.io/>`_.\nAfter this, an E2E-encrypted direct P2P connection (or, in some cases, via a \"transit relay\" service) is established between the two computers;\nthat is, between the computer that created the wormhole code, and the one that consumed it.\n\nThe key encrypting messages on this connection is only known to the two computers; the Mailbox server cannot see any message contents.\n(It, like any attacker, could try a single guess at the wormhole code). See the `Magic Wormhole documentation <https://magic-wormhole.readthedocs.io/en/latest/welcome.html#design>`_ for more details on this.\n\nThe \"Dilation\" feature further extends the above protocol to provide subchannels and \"durability\" -- this means the overall connection survives network changes, disconnections, etc.\nYou can change WiFi networks or put one computer to sleep yet remain connected.\n\nWhat ``fowl`` adds is a way to set up any number of localhost listeners on either end, forwarding data over subchannels.\nThe always-present \"control\" subchannel is used to co-ordinate opening and closing such listeners.\n\nWith some higher-level co-ordination, ``fowl`` may be used to set up complex workflows between participants, integrating services that would \"traditionally\" demand a server on a public IP address.\n\nAnother way to view this: streaming network services can integrate the Magic Wormhole protocol without having to find, link, and use a magic-wormhole library (along with the implied code-changes) -- all integration is via local streams.\n(There *are* implementations in a few languages so you could take that route if you prefer).\n\n\n\ud83d\udc64 Who Should Use This?\n-----------------------\n\nWe handle and expect two main use-cases of this program: integrators and end-users.\n\nHuman CLI users can use ``fowl`` itself to set up and use connections, for any purpose.\n\nFor developers doing integration, ``fowld`` provides a simple stdin/out protocol for any runtime to use.\nThat is, some \"glue\" code running ``fowld`` as a sub-process.\nThis co-ordinatoin program will also handle running necessary client-type or server-type networking applications that accomplish some goal useful to users. For example, \"pair-programming\" (for my case).\n\nSome other ideas to get you started:\n\n- \"private\" / invite-only streaming (one side runs video source, invited sides see it)\n- on-demand tech support or server access (e.g. set up limited-time SSH, VNC, etc)\n- ...\n\n\n\ud83d\udcbc Installation and Basic Usage\n-------------------------------\n\n``fowl`` and ``fowld`` are Python programs using the `Twisted <https://twisted.org>`_ asynchronous networking library.\n\nYou may install them with ``pip``::\n\n pip install fowl\n\nOnce this is done, ``fowl`` and ``fowld`` will appear on your ``PATH``.\nRun either for instructions on use.\n\nIn accordance with best practices, we recommend using a ``virtualenv`` to install all Python programs.\n**Never use ``sudo pip``**.\nTo create a virtualenv in your checkout of ``fowl``, for example:\n\n.. code-block:: shell\n\n python -m venv venv\n ./venv/bin/pip install --upgrade pip\n ./venv/bin/pip install fowl\n # or: ./venv/bin/pip install --editable .\n ./venv/bin/fowl\n\n.. _hello-world-chat:\n\n\ud83d\udcac Hello World: Chat!\n---------------------\n\nThe actual \"hello world\" of networked applications these days is chat, amirite? \ud83d\ude09\n\nWe will use two venerable network utilities (``nc`` and ``telnet``) to implement a **simple, secure, and e2e-encrypted chat**.\n\nYes, that's correct: we will make secure chat over ``telnet``.\nThe first insight here is that we can make ``nc`` listen on a localhost-only port, and we can make ``telnet`` connect to a localhost TCP port.\n\nAt first we can prove the concept locally, from one terminal to another.\nOpen two terminals.\nIn the first, run: ``nc -l localhost 8888``\nThis tells ``nc`` (aka \"net cat\") to listen on the localhost TCP port \"8888\" (it will echo anything that comes in, and send anything you type).\n\nIn the second terminal: ``telnet localhost 8888``\nThis instructs telnet to connect to localhost TCP port 8888 -- that is, the very netcat instance running in the first terminal.\nType \"hello world\" into either of the terminals, and you should see it appear on the other side.\n\n**Goal achieved!**, partially.\nWe have \"chat\" over ``nc`` and ``telnet``.\nIt's not pretty, but it works fine.\n\nHowever, we want to talk to other machines.\nThis means we need:\n* encryption;\n* and a way to arrange network connectivity\n\n**These additional features are exactly what ``fowl`` gives us.**\n\nSo, we still run the exact same ``nc`` and ``telnet`` commands, but first do some ``fowl`` magic on each machine.\n\nOn the *second* machine (the one running ``telnet``) we'll need to add in something that listens on port 8888.\nThis thing is: ``fowl --listen 8888 invite``\nWhen connected to the public Mailbox Server, this will print out a ``<secret code>`` like ``1-foo-bar``\n\nNext we want all the information this listener gets to be magically forwarded to the first machine (the one running ``nc``).\nSo, on it we run: ``fowl --allow-connect 8888 accept <secret code>``.\nThe ``<secret code>`` comes from the \"invite\" above, and is communicated -- usually via a human or two -- to the second machine.\n\nNote that we could swap \"``invite``\" and \"``accept``\" around if it's more convenient for one or the other human to go first.\n\nWhat happens under the hood is that the two ``fowl`` programs establish a secure connection, via the public Mailbox Server.\nThey then use this connection to maintain a persistent (possibly changing) TCP connection between each other (worst case, using the public Transit Relay) to send end-to-end encrypted messages.\n\n``fowl`` uses this connection to communicate via a simple protocol that can establish listeners on either end or ask for fresh connections.\nThese result in \"subchannels\" (in the Magic Wormhole Dilation protocol) that can send bytes back or forth.\n\nAny bytes received at either end of the connection are simply forwarded over the subchannel.\n\nFull example, computer one:\n\n.. code-block:: shell\n\n $ nc -l localhost 8888\n $ fowl --allow-connect 8888 invite\n Invite code: 1-foo-bar\n\nComputer two:\n\n.. code-block:: shell\n\n $ fowl --listen 8888 accept 1-foo-bar\n $ telnet localhost 8888\n\n**Now we have encrypted chat**.\n\nThese two programs can run **anywhere on the Internet**.\nLike TCP promises, all bytes are delivered in-order.\nIn addition, they are **encrypted**.\nAlso the stream will **survive changing networks** (disconnects, new IP addresses, etc); that is, the actual inter-computer TCP connection is re-stablished, but to the applications (``nc``, ``telnet``) it looks uninterupted.\n\n\n.. note::\n\n The two public servers mentioned (the Mailbox Server and the Transit Relay) will learn the IP addresses of who is communicating.\n Tor is supported for users who do not wish to reveal their network location.\n **Neither server can see any plaintext** (like any other attacker, the Mailbox Server could try a single but destructive and noticable guess at the code for any mailbox).\n\n\n\ud83d\udce6 Other Platforms\n------------------\n\nWe welcome contributions from people experienced with packaging for other installation methods; please get in touch!\n\n\n\ud83d\ude9a Stability and Releases\n-------------------------\n\nThis is an early release of, essentially, a proof-of-concept.\nWhile we intend to make it a stable base to put co-ordination software on top, it is not yet there.\nAPIs may change, options may change.\nIf you are developing on top of ``fowl``, please get in touch so we know what you need \ud83d\ude0a\n\nAll releases are on PyPI with versioning following a `CalVer <https://calver.org>`_ variant: ``year.month.number``, like ``23.4.0`` (for the first release in April, 2023).\n\nSee ``NEWS.rst`` for specific release information.\n\n\n\ud83e\uddd9 Contributors\n---------------\n\n- `meejah <https://meejah.ca>`_: main development\n- `balejk <https://github.com/balejk>`_: early feedback, proof-reading, review and testing\n",
"bugtrack_url": null,
"license": "The MIT License (MIT) Copyright (c) 2023 meejah Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the \"Software\"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ",
"summary": "Forward Over Wormhole Locally provides bi-directional streaming data over secure and durable Dilated magic-wormhole connections. Secure communication with easy setup.",
"version": "24.12.0",
"project_urls": null,
"split_keywords": [
"cryptography",
" forwarding",
" magic-wormhole",
" private"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "524e7df21ca7dce31e85c74239727dd20df0b7f40e99b5c3eb72ffd1d4fe6f2e",
"md5": "f6e116bdeb92c159142f7fe5e008833f",
"sha256": "2f515055d69aaf048fe9527f54060186428ab327c8db6d6647aa283dceb5b5c3"
},
"downloads": -1,
"filename": "fowl-24.12.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "f6e116bdeb92c159142f7fe5e008833f",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.6",
"size": 60144,
"upload_time": "2024-12-17T19:48:58",
"upload_time_iso_8601": "2024-12-17T19:48:58.432428Z",
"url": "https://files.pythonhosted.org/packages/52/4e/7df21ca7dce31e85c74239727dd20df0b7f40e99b5c3eb72ffd1d4fe6f2e/fowl-24.12.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "98dcc92f7184cc7b687825526ca755aecd0191556775401659a81e134c77862d",
"md5": "279d2fb334c23b251bb090e2eff81ef1",
"sha256": "3eb872ffc7e6127178dd52cba0c03097ff3f32f359e56aba06df6851a5635773"
},
"downloads": -1,
"filename": "fowl-24.12.0.tar.gz",
"has_sig": false,
"md5_digest": "279d2fb334c23b251bb090e2eff81ef1",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 172401,
"upload_time": "2024-12-17T19:49:00",
"upload_time_iso_8601": "2024-12-17T19:49:00.562602Z",
"url": "https://files.pythonhosted.org/packages/98/dc/c92f7184cc7b687825526ca755aecd0191556775401659a81e134c77862d/fowl-24.12.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-12-17 19:49:00",
"github": false,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"lcname": "fowl"
}